Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


11:53 AM
Eric Cole
Eric Cole
Connect Directly

Taming the Beast: Preventing/Detecting Insider Threat

While many companies deal with the problem of insider threat, there are some practical things that can be done to both prevent and detect insider threat. Always remember, prevention is ideal but detection is a must.

The insider threat is continually occurring, even if companies do not realize it. What makes the insider threat such a significant problem is that it cannot be prevented like an external attack. If someone is running a buffer overflow attack against your system, you can patch the system and prevent the attack from occurring. If someone is connecting to your Web server and exploiting port 80, you can close down port 80 or block it at the firewall. The problem with the insider threat is that there is no patch and it is impossible to just shut it down. In order to shut down the insider threat, an organization must remove all insiders (employees). For obvious reasons this is not a practical solution and would undoubtedly put any organization out of business.

The problem with the insider threat is that it is impossible to 100 percent prevent it from happening. While there are many steps organizations can take to minimize the insider threat, it is impossible to completely eliminate it. External attacks, such as exploiting vulnerabilities, can be 100 percent prevented by installing security patches. Unfortunately the insider threat cannot be 100 percent prevented because employees must have access to company resources in order to perform their job duties. If all company resources were to be removed, well, it is easy to see that the company would quickly fail. Organizations need to take all possible precautions to stop the insider threat, but they must also realize that prevention alone is not enough.

A key theme when dealing with the insider threat is, “Prevention is ideal, but detection is a must.” When dealing with the insider threat, prevention will take you only so far. When prevention fails, it is critical that the problem be detected in a timely manner. Think of it like this: Ideally you would like to stop a fire from occurring in your house; however, if a fire does occur you want to make sure you can detect it in a timely manner. That is why smoke detectors are installed.

This raises a critical issue with detection. Detection does absolutely nothing if no one responds to the problem being detected. A smoke detector will detect a fire, but if no one responds to the fire, it will continue to burn. A detective measure needs some type of intervention. Ideally we want to prevent problems, but if prevention is not possible, detective measures need to be deployed in such a way that someone will respond to the problem in a timely manner. If an organization detects a problem and no one responds to it, then what was the purpose of detecting the problem in the first place?

Dr. Eric Cole, Ph.D., is a security expert with more than 15 years of hands-on experience. Cole has experience in information technology with a focus on perimeter defense, secure network design, vulnerability discovery, penetration testing, and intrusion detection systems. He is the author of several books, including Hackers Beware, Hiding in Plain Site, Network Security Bible, and Insider Threat. He is the inventor of more than 20 patents, and is a researcher, writer, and speaker. Cole is a member of the Commission on Cyber Security for the 44th President and several executive advisory boards, and is CTO of the Americas for McAfee. Cole is involved with the SANS Technology Institute (STI) and SANS working with students, teaching, and maintaining and developing courseware. He is a SANS fellow, instructor, and course author. Dr. Cole has 20 years of hands-on experience in information technology with a focus on building out dynamic defense solutions that protect organizations from advanced threats. He has a Master's degree in computer science from NYIT and a Doctorate from Pace University, with a ... View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Zero Trust doesn't have to break your budget!
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-06-16
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the han...
PUBLISHED: 2021-06-16
This vulnerability allows remote attackers to execute arbitrary code on affected installations of GE Reason RPV311 14A03. Authentication is not required to exploit this vulnerability. The specific flaw exists within the firmware and filesystem of the device. The firmware and filesystem contain hard-...
PUBLISHED: 2021-06-16
Helm is a tool for managing Charts (packages of pre-configured Kubernetes resources). In versions of helm prior to 3.6.1, a vulnerability exists where the username and password credentials associated with a Helm repository could be passed on to another domain referenced by that Helm repository. This...
PUBLISHED: 2021-06-16
Apollos Apps is an open source platform for launching church-related apps. In Apollos Apps versions prior to 2.20.0, new user registrations are able to access anyone's account by only knowing their basic profile information (name, birthday, gender, etc). This includes all app functionality within th...
PUBLISHED: 2021-06-16
FOGProject v1.5.9 is affected by a File Upload RCE (Authenticated).